منابع مشابه
BlueWallet: The Secure Bitcoin Wallet
With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin priva...
متن کاملWallet-on-wheels - Using vehicle's identity for secure mobile money
Mobile Money is growing in the developed world while cars are becoming much smarter. Combine the two and you get cars that ‘own’ a wallet. We propose not a user-centric, but a car-centric service that enables cars to have Pre-Pay subscription accounts for car-related purchases and for linking to financial services. The solution uses advanced car communications capability and securely stored car...
متن کاملElectronic Commerce and E-wallet
In electronic commerce, the challenges of payment transactions were initially underestimated. Business via the internet and mobile telephony has so far been dominated by the methods of payment systems in traditional business. However, in light of advances in e-commerce, traditional business models are increasingly coming up against their limits. To understand the concept of electronic commerce,...
متن کاملOn-Line E-Wallet System with Decentralized Credential Keepers
We propose a generalization of the architecture of an electronic wallet, as first developed in the seminal European research project CAFE. With this model you can leave most of the content of your electronic wallet at the security of your residential electronic keeper, while roaming with your favorite mobile terminals. Emerging mobile handsets with both short range Bluetooth and cellular GPRS c...
متن کاملProvably Secure and E cient Block Ciphers
The security and eciency of two recently proposed block ciphers, bear and lion, both based on a hash function and a stream cipher, is discussed. Meet-in-the-middle attacks are presented which can be used to dramatically reduce the complexity of a brute-force key search on both these ciphers. A new block cipher is described which is not susceptible to meet-in-the-middle attacks, is provably secu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Scientific Research in Computer Science, Engineering and Information Technology
سال: 2021
ISSN: 2456-3307
DOI: 10.32628/cseit2173101